You are here
Home > COMPUTER SECURITY TIPS > 5 Elements Of Computer Device Security

5 Elements Of Computer Device Security

5 Elements Of Computer Device Security


When we talk of computer device security in any gathering, we are looking at the security of information that we have stored on the computer. That means those data are free from external attack.

Before you can say that a computer is secured, there are some factors that must be present. It must have some attributes. If anyone of them is missing, that means the computer is not secured. It is as simple as that.

Without wasting time, here are the five elements of a good security system. I do hope that you will examine your security system and make an adjustment. It is not too late to do the right thing
5 elements of computer device security

Now, let’s look at the elements together…

#1 Confidentiality as part of computer device security
First and foremost, when we talk of confidentiality in security, it has to do with ensuring that information is assessable only to those authorized to have access. This is contained in ISO 17799. It entails setting up access and security level that prevents an unauthorized person from having access to information.

#2 authenticity

The principle of authenticity is the identification and assurance of the origin of the information. Here, you are sure that the information actually comes from the right source. You do not have to doubt the sender with this protocol in place.

#3 integrity as part of computer device security
When talking about integrity in security, it has to do with ensuring that the information is accurate, complete, and reliable and is in its original form. This guarantees that the information has not tampered within the process of transmission.


YOU CAN ALSO READ  3 Social Media Security Issues Online Considered

#4 availability as part of computer device security

The principle of availability is about ensuring that the information is assessable to authorized persons when required without delay. By and large, there is nothing that must prevent the authorized personnel from having the information. In order for this to be available, the person must be able to provide the necessary credentials.

#5 non-repudiation in computer device security
Under the principle of non-repudiation, the sender of the information cannot deny that he was not the one that sent the information. In addition, this is possible because the information will always contain their credentials. As long as it has that, the sender cannot say he has not sent the information.


Now your take on this argument.

We would also like to hear what you feel about the topic we discussed today. Your feedback is very important to us. Feel free to drop your comments and recommendations. If you have a contrary opinion, you can drop that too.


You can also join our Facebook Page CRMNigeria for more updates. You can do that by clicking on the link or searching for our page on Facebook.


Action Point.
You need to confirm your subscription by clicking on the link sent to you. You can check the spam folder for it. Add us to your mailing list to receive directly from us.


PS: Click on the link below to sign up for my Online E-Course CRM Training. Make sure you confirm your subscription by clicking on the link sent to you. Thanks.

Adeniyi Salau
Adeniyi Salau (CEP, MOS, MCP, CSCU (Project 2016) is a Digital Marketer, Project Manager and SEO Expert of repute with about a decade of Blogging and online marketing experience. He is always ready to share his experience with others.

Leave a Reply

CommentLuv badge